Static task
static1
Behavioral task
behavioral1
Sample
d2e0696545bab0cdca49f2aaa739201b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2e0696545bab0cdca49f2aaa739201b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d2e0696545bab0cdca49f2aaa739201b_JaffaCakes118
-
Size
600KB
-
MD5
d2e0696545bab0cdca49f2aaa739201b
-
SHA1
71f8360c4defe4621dca43a17bee7ba1e7809aa2
-
SHA256
14ce704d70c17105b0f5e2bf746fa1f9fb2a3be8424132ca38dcbf737914d049
-
SHA512
418b2dd4d971b3232ff778eaf487be3d60e91b641cdf53320b1071bb5466bfa7926ec75244ce02c2053eb2aaeece6262a44aca8c46515f88e719180411f28339
-
SSDEEP
12288:eC6cwiyaRxjUYLQq9FJeIwq3x8Bv8kCZ:eEyYxTQ2gIn6vY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d2e0696545bab0cdca49f2aaa739201b_JaffaCakes118
Files
-
d2e0696545bab0cdca49f2aaa739201b_JaffaCakes118.dll windows:4 windows x86 arch:x86
6caf5092d4670f2acee0fb01386c0779
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateFileA
CreateFileW
CloseHandle
UnmapViewOfFile
VirtualFree
VirtualAlloc
GetSystemInfo
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
SetLastError
VirtualProtect
FlushInstructionCache
GetCurrentProcess
RtlUnwind
GetCommandLineA
GetVersion
RaiseException
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
CreateFileMappingA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
IsBadWritePtr
GetCPInfo
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
LCMapStringA
LCMapStringW
ReadFile
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
SetStdHandle
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetLocaleInfoW
GetFileSize
MapViewOfFile
GetLastError
WriteFile
OutputDebugStringA
LoadLibraryA
GetProcAddress
lstrcmpiA
WideCharToMultiByte
GetFullPathNameA
InterlockedCompareExchange
GetVersionExA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
CreateThread
Sleep
GetModuleHandleA
user32
GetCursorPos
GetAsyncKeyState
gdi32
ExtTextOutA
MoveToEx
ExtTextOutW
CreateCompatibleDC
SetMapMode
SetTextAlign
CreateFontIndirectW
CreateFontIndirectA
GetFontLanguageInfo
GetTextMetricsW
SetBkMode
SetBkColor
SetTextColor
GetCharacterPlacementW
GetCharacterPlacementA
SelectObject
DeleteDC
CreateDIBSection
GetGlyphOutlineA
GetTextMetricsA
GetObjectW
GetObjectA
DeleteObject
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: 420KB - Virtual size: 418KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 4KB - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ